mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-02 01:27:27 -04:00
Update README.md
This commit is contained in:

committed by
GitHub

parent
c7a795c6d4
commit
f9c85f08e0
@ -69,26 +69,38 @@ For that, go to the [Web Console](https://auth.otc.t-systems.com/authui/login) a
|
|||||||
I strongly advise you, to create a separate project for the T-Pots in your tennant.
|
I strongly advise you, to create a separate project for the T-Pots in your tennant.
|
||||||
In my case I named it `tpot`.
|
In my case I named it `tpot`.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
<a name="api-user"></a>
|
<a name="api-user"></a>
|
||||||
## Create API user
|
## Create API user
|
||||||
The next step is to create a new user account, which is restricted to the project.
|
The next step is to create a new user account, which is restricted to the project.
|
||||||
This ensures that the API access is limited to that project.
|
This ensures that the API access is limited to that project.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
<a name="key-pair"></a>
|
<a name="key-pair"></a>
|
||||||
## Import Key Pair
|
## Import Key Pair
|
||||||
Now log in with the newly created user account and select your project.
|
:warning: Now log in with the newly created user account and select your project.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
Import your SSH public key.
|
Import your SSH public key.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
<a name="vpc-subnet-securitygroup"></a>
|
<a name="vpc-subnet-securitygroup"></a>
|
||||||
## Create VPC, Subnet and Security Group
|
## Create VPC, Subnet and Security Group
|
||||||
- VPC and Subnet:
|
- VPC (Virtual Private Cloud) and Subnet:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
- Security Group:
|
- Security Group:
|
||||||
The configured Security Group should allow all incoming TCP / UDP traffic.
|
The configured Security Group should allow all incoming TCP / UDP traffic.
|
||||||
If you want to secure the management interfaces, you can limit the incoming "allow all" traffic to the port range of 1-64000 and allow access to ports > 64000 only from your trusted IPs.
|
If you want to secure the management interfaces, you can limit the incoming "allow all" traffic to the port range of 1-64000 and allow access to ports > 64000 only from your trusted IPs.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
<a name="clone-git"></a>
|
<a name="clone-git"></a>
|
||||||
# Clone Git Repository
|
# Clone Git Repository
|
||||||
Clone the `tpotce` repository to your Ansible Master:
|
Clone the `tpotce` repository to your Ansible Master:
|
||||||
|
Reference in New Issue
Block a user